A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/aws-actions/configure-aws-credentials/issues/953 below:

If the assumed role name is `GitHubActions` the action will fail with a non specific error · Issue #953 · aws-actions/configure-aws-credentials · GitHub

Describe the issue

Ran into this for a few hours tonight where I was naming my role to be assumed GitHubActions and was failing to assume role via OIDC. The action spat out this error. Simply renaming the role to anything else ran successfully.

Could not assume role with OIDC: Not authorized to perform sts:AssumeRoleWithWebIdentity

The pitfall is especially time consuming because web searching the error leads to posts suggesting to fix the conditions in the IAM trust policy which are unrelated.

I suggest either highlighting this restricted role name in the documentation, or fixing the issue preventing use of this role name.

will-alleratech, zchenyu, ruchernchong, samuel-phan, AdamRealE and 1 moreponkio-o, iKevinY and yvele


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4